Data Breaches

APT37's Air-Gap Breakthrough and Why Your Event Security Strategy Needs an Upgrade

APT37’s Air-Gap Breakthrough and Why Your Event Security Strategy Needs an Upgrade

I’ve been tracking some concerning developments this week that really highlight how our threat models need to evolve. North Korean APT37 has broken new ground with air-gapped network compromises, while major events are facing wireless and drone threats that most security teams aren’t prepared for. Let me walk you through what’s happening and why it matters for all of us.

When Fiction Meets Reality: Healthcare Ransomware Attacks Mirror What's on TV

When Fiction Meets Reality: Healthcare Ransomware Attacks Mirror What’s on TV

You know that uncomfortable feeling when life starts imitating art a little too closely? That’s exactly what’s happening right now with ransomware attacks on healthcare systems. HBO’s medical drama “The Pitt” is currently showing audiences what a hospital ransomware attack looks like on screen, while a real Mississippi healthcare system is dealing with the exact same nightmare in real life.

When Football Clubs Meet Hackers: Why Sports Organizations Are Prime Targets

When Football Clubs Meet Hackers: Why Sports Organizations Are Prime Targets

You know, I’ve been watching the cybersecurity space for years, but the Olympique Marseille breach this week really drives home something we’ve been seeing more of lately – sports organizations are becoming serious targets for cybercriminals.

The French football club confirmed they suffered what they’re calling an “attempted” cyberattack after threat actors started bragging about breaching their systems earlier this month. Now, I find it interesting they’re using the word “attempted” when there’s already evidence of a data leak. It’s that classic damage control language we see from organizations trying to minimize the impact while they’re still figuring out the full scope.

When AI Tools Turn Against Their Users: The Hidden Risks in Our Daily Workflows

When AI Tools Turn Against Their Users: The Hidden Risks in Our Daily Workflows

You know that sinking feeling when you realize the tools you trust might be working against you? That’s exactly what happened this week with some eye-opening discoveries about AI-powered development tools and a critical infrastructure vulnerability that should have us all double-checking our network security.

Claude’s Code Execution Flaw: A Developer’s Nightmare

Let’s start with what might be the most unsettling news for our developer colleagues. Check Point researchers just exposed some serious vulnerabilities in Anthropic’s Claude AI assistant that could let attackers silently compromise developer machines through malicious configuration files. Claude Code Flaws Exposed Developer Devices to Silent Hacking

When Criminals Become Victims: The Week Ransomware Gangs Got a Taste of Their Own Medicine

When Criminals Become Victims: The Week Ransomware Gangs Got a Taste of Their Own Medicine

You know it’s been an interesting week in cybersecurity when the most satisfying story involves a Russian ransomware gang getting blackmailed by a fake FSB officer. But before we dive into that delicious irony, let’s talk about the more serious threats that crossed our desks this week – because while schadenfreude is fun, the reality is that attackers are getting more sophisticated across every front.

The Cisco Zero-Day That Hid for Three Years Shows Why We Need to Rethink Detection

The Cisco Zero-Day That Hid for Three Years Shows Why We Need to Rethink Detection

I’ll be honest – when I saw the news about CVE-2026-20127, the maximum-severity Cisco SD-WAN vulnerability that went undetected for three years, my first thought wasn’t about the technical details. It was about all those security assessments where we confidently told clients their networks were secure.

This story, along with some other developments this week, really drives home how attackers are getting better at staying invisible while we’re still playing catch-up with detection.

When API Keys Turn Dangerous: Google's Gemini Exposure Shows Why Legacy Security Assumptions Don't Hold

When API Keys Turn Dangerous: Google’s Gemini Exposure Shows Why Legacy Security Assumptions Don’t Hold

You know that feeling when something you’ve always considered “safe enough” suddenly becomes a major security risk? That’s exactly what happened this week with Google API keys, and it’s a perfect reminder of how quickly our security assumptions can become outdated.

The Google API Key Problem That Caught Everyone Off Guard

Here’s the situation: developers have been embedding Google API keys in client-side code for years, primarily for services like Maps. Sure, it wasn’t ideal security practice, but the risk was relatively contained – someone could abuse your Maps quota or rack up some billing charges. Annoying, but not catastrophic.

When Everything Breaks at Once: Payment Systems, Supply Chains, and the Speed of Modern Attacks

When Everything Breaks at Once: Payment Systems, Supply Chains, and the Speed of Modern Attacks

You know that feeling when you check the security news and every headline seems worse than the last? That was me yesterday morning, scrolling through what felt like a parade of “how did we get here” moments. From the PCI Council basically admitting they’re struggling to keep up, to a medical device maker getting hit by ransomware, it’s been one of those weeks that reminds us why we chose this profession—and why we sometimes question that choice.

Chinese APT Group Weaponizes SaaS APIs While Critical Patches Pile Up

Chinese APT Group Weaponizes SaaS APIs While Critical Patches Pile Up

We’re seeing some concerning patterns this week that deserve attention. While everyone’s focused on the upcoming conference season, threat actors are getting creative with their attack methods, and some familiar names are back in the patch spotlight.

SaaS APIs: The New Highway for Chinese Espionage

The biggest story catching my eye involves a sophisticated Chinese threat group that’s been using SaaS API calls to blend their malicious traffic with legitimate business operations. Google’s Threat Intelligence Group and Mandiant disrupted this global campaign after discovering it had successfully breached dozens of telecom companies and government agencies.

When CAPTCHAs Become Weapons: A Week of Creative Cyber Attacks

When CAPTCHAs Become Weapons: A Week of Creative Cyber Attacks

You know that feeling when you think you’ve seen every possible attack vector, and then someone finds a way to weaponize a CAPTCHA page? Well, this week delivered exactly that kind of surprise, along with some sobering reminders about how creative threat actors are getting with their operations.

The Internet Archive’s CAPTCHA DDoS Drama

Let’s start with the strangest story of the week. According to the Smashing Security podcast, someone running an internet archiving service allegedly turned their own CAPTCHA verification system into a DDoS weapon against a Finnish blogger who was asking too many questions.